xref: /386bsd/usr/src/games/dm/dm.conf.0 (revision a2142627)
1DM.CONF(5)                386BSD Programmer's Manual                DM.CONF(5)
2
3NNAAMMEE
4     ddmm..ccoonnff - dm configuration file
5
6DDEESSCCRRIIPPTTIIOONN
7     The dm.conf file is the configuration file for the dm(8) program.  It
8     consists of lines beginning with one of three keywords, ``badtty'',
9     ``game'', and ``time''.  All other lines are ignored.
10
11     Any tty listed after the keyword ``badtty'' may not have games played on
12     it.  Entries consist of two white-space separated fields: the string
13     ``badtty'' and the ttyname as returned by ttyname(3).  For example, to
14     keep the uucp dialout, ``tty19'', from being used for games, the entry
15     would be:
16
17           badtty  /dev/tty19
18
19     Any day/hour combination listed after the keyword ``time'' will disallow
20     games during those hours.  Entries consist of four white-space separated
21     fields: the string ``time'', the unabbreviated day of the week and the
22     beginning and ending time of a period of the day when games may not be
23     played.  The time fields are in a 0 based, 24-hour clock.  For example,
24     the following entry allows games playing before 8AM and after 5PM on Mon-
25     days.
26
27           time            Monday  8       17
28
29     Any game listed after the keyword ``game'' will set parameters for a spe-
30     cific game.  Entries consist of five white-space separated fields: the
31     keyword ``game'', the name of a game, the highest system load average at
32     which the game may be played, the maximum users allowed if the game is to
33     be played, and the priority at which the game is to be run.  Any of these
34     fields may start with a non-numeric character, resulting in no game limi-
35     tation or priority based on that field.  The game "default" controls the
36     settings for any game not otherwise listed, and must be the last ``game''
37     entry in the file.  Priorities may not be negative.  For example, the
38     following entries limits the game ``hack'' to running only when the sys-
39     tem has 10 or less users and a load average of 5 or less; all other games
40     may be run any time the system has 15 or less users.
41
42           game            hack            5       10      *
43           game            default *       15      *
44
45FFIILLEESS
46     /etc/dm.conf  The dm(8) configuration file.
47
48SSEEEE AALLSSOO
49     setpriority(2),  ttyname(3),  dm(8)
50
514.2 Berkeley Distribution        May 10, 1991                                2
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67